End of 2024 20% Discount Promotion

Duration:
Only 2 days
Study Mode:
Classroom
Next Date:
27/01/2025 (Monday)

Overview

The goal of this 2 day accelerated course is to teach non-technical students the basic knowledge of Computer Security and Computer Networks so that they are aware of actual hacker frauds like Identity Theft, Viruses, Trojans and Phishing.

We will arm you with knowledge that can complement the system administrator's security safeguards and the chief security officer's security architecture for the corporation.

Those holding the EC Security5 Certificate have learned how to guard their own or their companies information assets.

Our Security5 Certification Program

  • Allows you to achieve your certifications in a fraction of the time of 'traditional training' while delivering industry-leading exam passing percentages
  • Helps students grasp complex technical concepts more easily by identifying and catering to individual student learning styles through a mixed visual, auditory and kinaesthetic-tactual delivery system
  • Enhances retention by employing accelerated learning techniques focused on committing information to long-term memory

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Benefits

Having proof of your skills and knowledge gives you the edge over other candidates when applying for a job. Here are some additional benefits of earning Security|5:

  • Independent validation of achievement of a level of competency accepted and valued by the industry
  • Proven understanding of common frauds like Identity Theft, Phishing, email hoaxes, viruses and backdoors
  • Increased knowledge, leading to increased job satisfaction
  • Better career perspective with better IT knowledge
  • Proof of transferable skills and a solid credential, which make you more marketable

What Security5 Can do for Your Company

Certification provides companies with skilled employees, leading to:

  • Less security risks through better trained employees
  • Higher awareness of frauds like social engineering
  • Increased productivity as certified professionals are able to perform at accepted industry standards

Who Should Earn a Security5 Certification?

  • Office knowledge workers
  • Home users
  • Any non-IT person using computers in their office

Increase your value on the job market

  • Security5 is a globally recognized certification
  • Security5 is the ideal starting point for anyone interested in learning computer networking and security basics

Curriculum

Course Materials

Students attending this blended-learning program will receive a robust set of course materials that caters to each of the three primary individual learning-intake styles (auditory, visual, and kinaesthetic-tactual) - critical for a sucessful accelerated learning experience.

Daily lectures and review sessions are supplemented by a combination of Proprietary Lab Manual and Program Courseware - developed to address the unique demands of accelerated learners.

Course program

Foundations of Security

  • Essential terminology
  • Defining security
  • Need for security
  • Cyber crime
  • Information Security statistics
  • IS triangle
  • Security myths
  • How to harden security

Basic Security Procedures

  • Why do I need to worry about my computer's security?
  • Introduction
  • Hardening of Operating System
  • Updating the system and configuring the updates
  • Disable unnecessary services
  • Strong password creation
  • Deployment of antivirus and firewall
  • Disable guest account access
  • Make Private folders
  • Security settings in MS Office applications

Desktop Security

  • What is file sharing?
  • Types of file sharing
  • How to share folder?
  • Configuring shared folder permissions
  • Hiding files and folders
  • File sharing tips
  • File downloading tips
  • How to backup data and restore?
  • How to encrypt and decrypt files?
  • How to kill suspect processes?

Administering Windows Securely

  • How to use the event viewer?
  • How to enable auditing in windows?
  • How to read logs on your system?
  • How to close ports?
  • Overview of the windows registry
  • How to restore the registry?
  • How to close a port?
  • Common internal commands
  • How to find services and ports they listen on?

Recognizing Security Threats and attacks

  • Phishing and its countermeasures
  • Virus
  • Trojan Horse
  • Worms
  • Spyware
  • Adware
  • Keylogger
  • Social engineering
  • Denial of Service
  • Spamming
  • Port Scanning
  • Password cracking
  • Basic security measures

Secure Internet Access

  • Basic browser security settings
  • How to restrict site access
  • Removing site from security zone
  • Secure website detection
  • Secure site and browser properties
  • Tools: Internet Filtering Software
  • Configuring Internet content access
  • Activating Content Advisor
  • How to deal with cookies
  • Using P2P networks securely
  • Choosing appropriate browser settings
  • Wireless network security features

Working on the Internet

  • Precepts of Security
  • Knowing Encryption
  • Digital Certificate
  • Digital Signature
  • Working with e-mail (web based)
  • Working with e-mail (mail client)
  • Working with File Transfer - FTP
  • Working with File Transfer - Web Folders

Knowing Online Payment Systems

  • Working with Credit Cards
  • Working with Instant Messengers
  • Working across File Sharing Networks
  • Working on Dial-in Networks
  • Working with Portable Devices
  • Working with Wireless Devices
  • Working with USB devices
  • Working with Media Files
  • Working with 3rd party software

Incident Response

  • What is Incident Response?
  • Incidents and responses:
  • Trojan attack
  • Boot sector virus attack
  • Corrupted registry
  • Automatic running of CD-ROM (autorun.inf)

Exam Track

The Security5 program certifies individuals in the security discipline. To achieve the Security5 certification, candidates must pass exam 112-12 Security Foundations which will be hold on the 2nd day in the afternoon.

What's Included

EC-Council official courseware

  • EC-Council - Security5 courseware kit

Prerequisites

Students who are successful in the Security5 Certification Firebrand Training should possess basic computing skills such as browsing the web and checking e-mails.

Course Dates


Start
Finish
Status
Study Mode
Prices
27/01/2025 (Mon)
28/01/2025 (Tue)
Open
Classroom
23/04/2025 (Wed)
24/04/2025 (Thu)
Open
Classroom
28/07/2025 (Mon)
29/07/2025 (Tue)
Open
Classroom
28/10/2025 (Tue)
29/10/2025 (Wed)
Open
Classroom